libtar: Arbitraty code execution — GLSA 201402-19

A buffer overflow in libtar might allow remote attackers to execute arbitrary code or cause a Denial of Service condition.

Affected packages

dev-libs/libtar on all architectures
Affected versions < 1.2.20-r2
Unaffected versions >= 1.2.20-r2

Background

libtar is a C library for manipulating POSIX tar files.

Description

An integer overflow error within the β€œth_read()” function when processing long names or link extensions can be exploited to cause a heap-based buffer overflow via a specially crafted archive.

Impact

A remote attacker could entice a user to open a specially crafted file using a program linked against libtar, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All libtar users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/libtar-1.2.20-r2"
 

References

Release date
February 21, 2014

Latest revision
February 21, 2014: 1

Severity
normal

Exploitable
remote

Bugzilla entries